Computer Networking A protocol is a set of rules governing a time sequence of events that must take place between an interface None of these across an interface between modems between peers between an interface None of these across an interface between modems between peers ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is true regarding access lists applied to an interface? You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. You can apply two access lists to any interface. You can place as many access lists as you want on any interface until you run out of memory. One access list may be configured, per direction, for each layer 3 protocol configured on an interface. You can apply only one access list on any interface. ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following is an IEEE standard for frame tagging? ISL 802.3Z 802.3U 802.1Q ISL 802.3Z 802.3U 802.1Q ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which file transfer protocol uses UDP? TELNET TFTP None of these FTP NFS TELNET TFTP None of these FTP NFS ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which of the following files is used for NetBIOS name resolution? ARP HOSTS LMHOSTS FQDN None of these ARP HOSTS LMHOSTS FQDN None of these ANSWER DOWNLOAD EXAMIANS APP
Computer Networking Which configuration command must be in effect to allow the use of 8 subnets if the Class C subnet mask is 255.255.255.224? Router (config) #ip classless Router (config) #ip unnumbered Router (config) #ip subnet-zero Router (config) #no ip classful Router (config) #ip classless Router (config) #ip unnumbered Router (config) #ip subnet-zero Router (config) #no ip classful ANSWER DOWNLOAD EXAMIANS APP